InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Phishing for Needles in a Haystack: How Phish are Crushing Your SOC

Presented by

Mick Leach, Security Operations Manager at Abnormal Security

About this talk

Most people believe that the SOC is on the front lines, defending the castles against the forces of darkness. And while that’s true, it’s never quite as heroic as we’d like it to be. In fact, most of our time is spent looking for needles in a haystack—trying to determine which emails are real phishing attacks, and which ones are spam. In this webinar, Mick Leach, Security Operations Manager at Abnormal Security, will discuss why email attacks are increasing at an alarming rate, and why the solutions meant to solve that challenge often increase the burden on the Security Operations team. You'll learn: - Why secure email gateways and other log correlation tools are making it more difficult for SOC teams to do their work - How security awareness training can cause more harm than good - Which tools Mick uses to help his team keep the organization safe and stay sane - How Abnormal Security uses the Abnormal platform to stop the most dangerous threats With full insight into how Mick and his team stopped a $900,000 fraudulent wire transfer, this is a webinar you won’t want to miss.
Abnormal AI

Abnormal AI

16770 subscribers147 talks
Abnormally-Precise, Cloud-Native Email Security
Learn more about new approaches to email security to stop advanced business email compromise attacks that bypass traditional, threat intelligence-based email security solutions. Unlike legacy email security solutions, the Abnormal Security platform uses an innovative AI-based approach that deeply understands the people, relationships, and business processes to stop the most sophisticated and costly attacks.
Related topics